Nirmata Earns Certified Kubernetes Status!

29 November 2017

Nirmata Earns Certified Kubernetes Status!

We are thrilled to announce that Nirmata has achieved Certified Kubernetes status! Over the last year Kubernetes has gained significant mindshare from users and vendors alike. At Nirmata, we strongly believe that Kubernetes is a key enabling technology for any cross-cloud application platform. Nirmata eases the deployment and management of Kubernetes clusters and also enables governance, control, and visibility of applications deployed on Kubernetes.  As a Certified Kubernetes product, Nirmata guarantees that the complete Kubernetes API functions as specified, so users can rely on a seamless, stable experience.

“Kubernetes enables the enterprise-journey to cloud-native, and Nirmata is proud to deliver a Certified Kubernetes multi-cloud application management solution.”, said Jim Bugwadia, Founder and CEO at Nirmata.

“The new Certified Kubernetes Conformance Program gives enterprise organizations the confidence that workloads that run on any Certified Kubernetes Distribution or Platform will work correctly on any other version,” said Dan Kohn, Executive Director, Cloud Native Computing Foundation. “The interoperability that this program ensures is essential to Kubernetes meeting its promise of offering a single open source software stack supported by many vendors that can deploy on any public, private or hybrid cloud.”

If you are interested in learning more about how Nirmata works with Kubernetes, check out our videos here and here. If you are attending KubeCon 2017 in Austin, come visit us at booth S61 to see a demo or just chat about Kubernetes!

Kubernetes Deployment on vSphere using Nirmata
Managing containers at scale!

Latest

From the blog

The latest industry news, interviews, technologies, and resources.

View all blogs
How does Kyverno work
How Does Kyverno Work? A Simple Explanation for DevOps Teams

Kyverno is a Kubernetes-native policy engine that allows DevOps teams to define, validate, mutate, and generate Kubernetes resources using simple…

Kubernetes nodes/proxy GET → RCE: how “telemetry” permissions can compromise a cluster

A subtle (and frankly surprising) Kubernetes authorization behavior has resurfaced as a practical cluster-compromise path: an identity granted nodes/proxy access…